Exam 10: CompTIA Network+
Exam 1: CompTIA A+ Certification Exam: Core 1471 Questions
Exam 2: CompTIA A+ Certification Exam: Core 2409 Questions
Exam 3: CompTIA Advanced Security Practitioner (CASP+) CAS-003442 Questions
Exam 4: CompTIA Advanced Security Practitioner (CASP+) CAS-004107 Questions
Exam 5: CompTIA Cloud Essentials+165 Questions
Exam 6: CompTIA CySA+ Certification Exam (CS0-002)294 Questions
Exam 7: CompTIA Cloud+ (CV0-002)48 Questions
Exam 8: CompTIA Cloud+67 Questions
Exam 9: CompTIA IT Fundamentals387 Questions
Exam 10: CompTIA Network+829 Questions
Exam 11: CompTIA Project+540 Questions
Exam 12: CompTIA PenTest+ Certification Exam165 Questions
Exam 13: CompTIA Server+66 Questions
Exam 14: CompTIA Server+ Certification Exam779 Questions
Exam 15: CompTIA Security+1 k+ Questions
Exam 16: CompTIA Security+ 2021129 Questions
Exam 17: CompTIA CTT+ Essentials378 Questions
Exam 18: CompTIA Linux+252 Questions
Select questions type
A school is implementing a wireless network and wants to ensure there is adequate coverage. The gymnasium has thick cinder-block walls, and there are several offices adjacent to it. Which of the following should the network technician recommend to ensure full coverage while minimizing the total number of APs purchased?
(Multiple Choice)
4.8/5
(36)
Which of the following policies would be the MOST useful for defining the proper procedures when an employee is terminated abruptly?
(Multiple Choice)
4.9/5
(33)
A technician has started a major network project to upgrade to a higher throughput standard. The technician will need to install new patch panels and breakout boxes to support this infrastructure. Which of the following layers of the OSI model is the technician addressing at this stage of the upgrade?
(Multiple Choice)
4.9/5
(30)
A network technician is deploying mobile phones for a company's sales staff. Salespeople frequently travel nationally and internationally to meet with clients, and often have to roam or switch cellular providers. Which of the following standards is the BEST option to fit the requirements?
(Multiple Choice)
4.8/5
(37)
According to the troubleshooting methodology, which of the following steps will help a technician gather information about a network problem? (Choose two.)
(Multiple Choice)
4.7/5
(36)
Which of the following physical security controls is MOST likely to be susceptible to a false positive?
(Multiple Choice)
4.8/5
(35)
A network technician has deployed a new 802.11ac network and discovers some of the legacy POS equipment only supports WPA and 802.11a. Which of the following is the MOST secure method of connecting all devices while avoiding a performance impact to modern wireless devices?
(Multiple Choice)
4.9/5
(46)
A user believes a work email account has been compromised. A technician discovers that an email seeming to be from the user's bank shares the same origin IP address as the last login to the email account. Which of the following types of attack is described in this scenario?
(Multiple Choice)
4.9/5
(38)
A company has just refreshed the hardware in its datacenter with new 10G Ethernet switches. A technician wishes to set up a new storage area network but must use existing infrastructure. Which of the following storage standards should the technician use?
(Multiple Choice)
4.7/5
(34)
A network administrator has deployed a secure wireless network that authenticates using Active Directory network credentials so individual users are uniquely identified when connected to the WLAN. Which of the following wireless technologies has the administrator configured?
(Multiple Choice)
4.8/5
(35)
A network technician is asked to perform an unfamiliar task. Which of the following would the technician MOST likely reference?
(Multiple Choice)
4.8/5
(42)
Which of the following is a system of notation that uses base 16 rather than base 10?
(Multiple Choice)
4.8/5
(31)
A network technician has finished configuring a new DHCP for a network. To ensure proper functionality, which of the following ports should be allowed on the server's local firewall? (Choose two.)
(Multiple Choice)
4.8/5
(36)
A network technician is configuring a new firewall for a company with the necessary access requirements to be allowed through the firewall. Which of the following should be applied as the LAST rule in the firewall?
(Multiple Choice)
4.8/5
(36)
A SaaS provider has decided to leave an unpatched VM available via a public DMZ port. With which of the following concepts is this technique MOST closely associated?
(Multiple Choice)
4.9/5
(39)
A network administrator wants to employ a username and password authentication system for guest WiFi. Which of the following is the BEST option to provide this type of authentication?
(Multiple Choice)
4.9/5
(40)
Which of the following protocols is used by Active Directory for authentication?
(Multiple Choice)
4.7/5
(26)
Which of the following will listen on the line to ensure there is no traffic transmitting and implement a back-off timer if a collision occurs?
(Multiple Choice)
4.8/5
(30)
A network technician has just implemented a new wireless network that requires clients to use a WEP key for access. The technician is now required to make changes to ensure the network uses the strongest encryption available. After the changes are implemented, several users report being unable to connect. Which of the following is the MOST likely cause?
(Multiple Choice)
4.8/5
(31)
A company has decided to allow certain users to work remotely by opening up a VPN connection through the firewall. The security policy has been updated to allow VPN connections only from certain users and to specific areas on the network. Along with configuring the correct policies on the firewall, which of the following also needs to be configured on users' mobile devices to allow these VPN connections?
(Multiple Choice)
5.0/5
(27)
Showing 181 - 200 of 829
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)